Kali Linux

SharpStat : C# Utility That Uses WMI To Run CMD

SharpStat is a C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file,…

4 years ago

KsDumper : Dumping Processes Using The Power Of Kernel Space

KsDumper is a dumping processes using the power of kernel space. It is a custom driver that would allow me…

4 years ago

Yarasafe : SAFE Embeddings To Match Functions In Yara

YARASAFE is for automatic binary function similarity checks with Yara. SAFE is a tool developed to create Binary Functions Embedding…

4 years ago

How to Protect Yourself Against Common Password Attacks

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the…

4 years ago

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

AlertResponder is an automatic security alert response framework by AWS Server less Application Model. It is a server less framework…

4 years ago

TAS : A Tiny Framework For Easily Manipulate The TTY & Create Fake Binaries

TAS is a tiny framework for easily manipulate the tty and create fake binaries. The framework has three main functions,…

4 years ago

Corsy : CORS Misconfiguration Scanner

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. Requirements It only works with Python…

4 years ago

TeleGram-Scraper : Telegram Group Scraper Tool

TeleGram-Scraper is a telegram group scraper tool to fetch all information about group members. How To Install & Setup API…

4 years ago

Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find…

4 years ago

Gophish : Open-Source Phishing Toolkit

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily…

4 years ago